A New Mechanism for Service Recovery Technology by using Recovering Service s Data
|
|
- Trevor Sullivan
- 8 years ago
- Views:
Transcription
1 A New Mechanism for Service Recovery Technology by using Recovering Service s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com ABSTRACT Service recovery technology is an important constituent part of the emergency response technologies. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. By analyzing the relationship between service and data, we present a service recovery mechanism by recovering service s data. We introduce a third party service monitor to monitor the state changes of the service, design the data recovery model, and give an example of quick data recovery. At Last we present a prototype system of service recovery; the experimental results toward the prototype system show that the mechanism which designed by us can greatly improve the service recovery efficiency and it can meet the timeliness requirements of the information service. KEYWORDS service recovery, third party service monitor, data recovery model, Prototype system 1. INTRODUCTION Service recovery technology is an important constituent part of the emergency response technologies. Since 1988, the U.S. Computer Incident Response Coordination Center (CERTTCC) and Computer Incident Advisory Group set up many emergency response groups had been set up, and they had played an important role in the procedure of handling the network security events. These researches institutions regard the emergency response as an important part of the PDR security model. The emergency response technologies mainly include intrusion tracing, traps, collaboration processing, trusted recovery, disaster control, adaptive response, etc. And the CERT ICC also does much research on the technology of network survivability, which mainly includes attack identification, attack tolerance, attack response and system recovery from failure. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. Based on Service Oriented Architecture (SOA) [1], the technology system considers the commonness and characteristics of the service recovery processing, and modularizes the processing procedure. Then, it selects optimized recovery strategies in accordance with the properties of security incidents and the composition of the service. Through effective service coordination mechanism, it can achieve the objective that the minimum resource cost and the shortest response time during service recovery. Data recovery is the basis and prerequisite for service recovery, and the traditional data backup and recovery technology has been used to solve some problems in the service recovery. In this paper, we intend to design a service recovery mechanism by recovering service s data. DOI: /ijfcst
2 The rest of this paper is organized as follows. Section 2 discusses research background and related work. Section3 discusses the relationship between service and data. Section 4 discusses architecture and details. Section 5 discusses our implementation and experimental results. 2. RESEARCH BACKGROUND AND RELATED WORKS As the organization of the different services in the service-oriented architecture is loose, while the deployment of them is flexibility, the service recovery mechanism built on the Service Oriented Architecture (SOA) will be beneficial to the integration and use of various technologies. Figure 1 shows the basic composition and calling relationship for the information system recovery Figure 1. The basic structure of system recovery The existing service recovery technologies generally concern the traditional service concepts, for example, the specific network service or application service. As in the context of network environment, many technologies have been proposed to enhance the survivability and dependability of the service, such as the load balancing and connection switching, IP redirection technology [2], dynamic DNS technology [3], TCP transfer technology [4] and backup system switchover technology. And the researchers have proposed the system service switch protection method based on threshold cryptogram/secret sharing, and the method can be used on the CA, certification services, key exchange services, file services, DNS services, data services and routing services. Meanwhile, the researchers also built some forms of service recovery application systems by means of monitoring, acceptance testing and redundancy [5, 6], such as the web server systems and database systems. About the reactively service recover systems; some researchers have studied many technologies to recover the systems fast and efficiently. These works do not consider by zonetime faults or security-compromised components and also do not rely on redundancy to ensure that the system 14
3 stays available during recoveries, the main problems addressed in the present work. Huang et al [7] advocates the execution of some kind of recovery action after a fault is detected. And the recovery oriented computing project [8] proposed a set of methods to improve the recovery and reduce the time cost and other related techniques to detect the service failures, restart the minimum set of system components, undo some operator configuration errors and put the entire system state back to the modification operation. Joshi et al [9] do some works to diagnose system faults through several monitors and evaluate which is the best set of recovery actions that must be taken in order to recover the system as fast as possible. 3. THE RELATIONSHIP BETWEEN SERVICE AND DATA The service is mainly made up of the service body and the business information supporting service running; and the service body mainly consists of the service application and the function modules, also, the business information mainly consists of the static information and dynamic information. Moreover, in the sight of the data organization, the service body and the business information can all be regarded as data. Figure 2. The hierarchical relationship between service and data As is shown in Figure l, d service is made up of a series of sub-service. The hierarchical levels include top service level, sub-service level and meta-service level. And the S l,s 2,...,S n denotes a series of meta services. The so-called meta-service is the smallest unit of service that cannot be divided, and it can independently perform the functions. 4. ARCHITECTURE AND DETAILS 4.1 Architecture Design The main idea of architecture design is that once the service is complete failure, the system can achieve the object of efficient and quickly reconstructing the entire service. Based on recovering the service s data, we can recover the service bodies and the corresponding data. So we propose a service recovery mechanism that recovering the service s data and restarting the service. In other words, we divide the service recovery process into two phases; firstly, we recovery the service s data through quick data recovery technology; secondly, we restart the service to achieve the purpose of rerunning the service. In this architecture, we introduce a third party service monitor to monitor the state changes of the service, delivery service recovery orders and control the service rerunning process. The monitor is 15
4 completely independent from the application service. The communication and information transferring between the monitor and service is handled by specific interface. The architecture is shown in Figure Data Recovery Design Figure 3. The Architecture of Service Recovery by Data Recovery We can divide the recovery operations into two types, that is, the accurate data recovery and selective data recovery, according to the user s participation. The so-called accurate data recovery means that recovering all data modification operations in a certain period. Usually after a certain data backup version; and the selective data recovery means that the users query and browse the data modification operation sets, and they choose some specific modification operations to recovery the data. In order to record the data modification operations, the system must save the data modification logs and backup the logs to handling the accurate data recovery. The data recovery design model is shown in Figure 4. Once you need do accurate data recovery and selective data recovery, there are some steps needed to do. 1) the users determine the data operations sets by the data inquiry and browsing tools; 2) according to the corresponding record logs, the system generates data recovery request; 3) send the recovery request to the agent application of the data server; 4) the kernel recovery module receive the recovery request; 5) the kernel recovery module processes the corresponding data backup blocks; 6) Upon the supporting by the file system, the kernel recovery module completes the "replay" operation to recovery, the data state to the time of the specific modification operations. 16
5 Figure 4. The Data recovery Design Model 4.3 The Example of Data Recovery Procedure Specifically, we describe the failure recovery mechanism designed in this paper by way of the example of recovery procedure for a certain file. The basic idea of failure recovery is that the mechanism transfers direct data copying process into the operation on the File Allocation Table (abbreviated as FAT, mainly in FAT file system) or Master File Table (abbreviated as MFT, mainly in NTFS file system) and other similar data structures in other file system, while by modifying the link relationship of the selected file backup blocks in FAT, to regenerate the target file. By this means, the mechanism can reduce the direct read and write to the disk and improve the efficiency of the recovery process. For example, while the file state in Figure 5 is needed to recovery to the time T3, the selected file blocks used for recovery and the new link relationship of these blocks is shown in Figure 5. These blocks are linked end to end. And the operating system and file system can transparently access these data blocks. Figure 5. The Data Recovery Procedure 17
6 5. SYSTEM IMPLEMENTATION AND EXPRIMENT RESULTS 5.1 System Implementation We have implemented a prototype service recovery system on the FAT32 file system under the Windows XP platform. The basic architecture of prototype system is designed by the following steps: 1) Real-time monitoring the file modification operation while the service is running and the monitoring process is implemented by the file system filter driver; 2) backup the data according the current file modification operation; 3) record the last modified time of the data backup blocks; 4) record the disk storage space information of the data backup blocks, also the disk storage space information is referred as the disk formatting partition information, which include the start cluster number of the blocks, the end cluster number of the blocks and the block size; 5) so, the system generates many data backup blocks according to the each file modification operation made by the operating system processes and user processes: 6) the data backup blocks together form the sets of file backup pieces; 7) when the information system service is out of order, the users need recovery the file state to a certain time, which is referred as the time T t ; 8) the users select some certain data backup blocks in the data sets according to the T t ; 9) recovering the file by reconstructing the selected data blocks; The system implementation architecture is shown in Figure 6. Figure 6. the System Implementation Architecture 18
7 5.2 Test Platform Configuration The main hardware and software configurations of computer for testing are listed following: Platform: Personal computer CPU: Intel(R) Pentium(R) 4 CPU 2.8GHz RAM:2.0G Hard disk: 320G operating system: Microsoft windows XP( ) Service Pack 2 File System: FAT Data Recovery Performance Results Compared to the traditional data recovery technology, the method designed by us can greatly improve the data recovery efficiency. We select a 300MB data file, a500mb data file and a directory with 600 files for the comparison test. The method is that we compare the recovery time between the traditional way of directory disk copy and the way designed in this paper, and the test results are shown in Table 1. Table 1. Data Recovery Test Results Test Objects Data Recovery Methods Direct Disk Copy (s) 400 MB Data File MB Data File A Directory 25 6 Method Designed in this paper(s) We can see that data recovery mechanism designed in this paper can greatly improve the data recovery efficiency. Also, the service recovery efficiency has been improved greatly. Generally speaking, the time of the data recovery can be limited on the second level, and the service restarting time is merely several seconds. So, the entire service recovery process can be complemented in several seconds, which can greatly enhance the dependability and survivability of the information service. REFFERNECES [1] R. Michael, Evaluation of service selection techniques in service oriented computing networks," Smart Grid Technologies & Market Models, vol. 1, no4, pp ,2005. [2] J. Hu,C. Yang, "Enhancement of cellular IP routing by redirection at cross over base stations," IEEE VEHICULAR TECHNOLOGYCONFERENCE, vol. 62, no. 4, [3] Z. X. G. Yuping, "Principle and Realization of Dynamic DNS and Its Application in Mobile Packet Switching Network" Telecom Engineering Technics and Standardization, vol. 2, [4] G. Tan, S.A. Jarvis, Prediction of short-lived TCP transfer latency on bandwidth asymmetric links," Journal of Computer and System Sciences, vol. 72, no. 7, pp , 2A06. [5] Y. Hao, H. Luo, Y. Yang, et a1., "HOURS : Achieving DoS Resilience in an Open Service Hierarchy," in 2004 International Conference on Dependable Systems and Networks (DSN'04),2004. [6] W. He, 'Recovery in Web Service Applications," in 2004 IEEE International Conference on e- Technology, e-commerce and e-service (EEE'04), pp.25-28, [7] Y. Huang,C. Kintala, "Software implemented fault tolerance: Technologies and experience," IEEE International Symposium on Fault-Tolerant Computing, p. 2, [8] D. Patterson, A. Brown, P. Broad well, et al., "Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies," [9] K. R. Joshi, M. A. Hiltunen, W. H. Sanders, et al., "Automatic model driven recovery in distributed systems," in 24th IEEE Symposium on Reliable Distributed Systems, pp ,
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
More informationHigh Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,
More informationMCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationManaging and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
More informationMICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track
MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003
More informationOracle Database 11g: New Features for Administrators DBA Release 2
Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change
More informationIT Service Management with System Center Service Manager
Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies
More informationHigh Availability Essentials
High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationOracle 11g New Features - OCP Upgrade Exam
Oracle 11g New Features - OCP Upgrade Exam This course gives you the opportunity to learn about and practice with the new change management features and other key enhancements in Oracle Database 11g Release
More informationDesigning a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.
More informationNE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
More informationDeploying, Configuring, and Administering Microsoft Lync Server 2010
Course 10533: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Page 1 of 9 Deploying, Configuring, and Administering Microsoft Lync Server 2010 Course 10533: 4 days; Instructor-Led
More informationM6430a Planning and Administering Windows Server 2008 Servers
M6430a Planning and Administering Windows Server Servers Course 6430A: Five days; Instructor-Led Introduction This five-day instructor-led course provides students with the knowledge and skills to implement,
More informationEXCHANGE SERVER 2013 MESSAGING
EXCHANGE SERVER 2013 MESSAGING WINDOWS SERVER 2012, 70-341, 70-342 Module-1: Introduction to Windows Server 2012 Overview of Windows Sever 2012 Installing Windows Server 2012 Configuring Windows Server
More informationMaintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
More informationQuickStart Guide vcenter Server Heartbeat 5.5 Update 2
vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge
More informationDesigning a Microsoft SQL Server 2005 Infrastructure
Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationContingency Planning and Disaster Recovery
Contingency Planning and Disaster Recovery Best Practices Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
More informationManaging IBM Lotus Notes Domino 7 Servers and Users. Course Description. Audience. Course Prerequisites. Machine Requirements.
Managing IBM Lotus Notes Domino 7 Servers and Users Course Code: 190-722 Course Title: Managing IBM Lotus Notes Domino 7 Servers and Users Duration: 3 classroom equivalent days Price: 990 USD + IVA Course
More informationCourse 10533A: Deploying, Configuring, and Administering Microsoft Lync Server 2010
Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course 10533A: Deploying, Configuring, and Administering Microsoft Lync
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationCourse Outline: Course 20412-Configuring Advanced Windows Server 2012 Services
Course Outline: Course 20412-Configuring Advanced Windows Server 2012 Services Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: The five day course is part three,
More information5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers Course 6430 Five days Instructor-led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
More informationThe functionality and advantages of a high-availability file server system
The functionality and advantages of a high-availability file server system This paper discusses the benefits of deploying a JMR SHARE High-Availability File Server System. Hardware and performance considerations
More informationNeverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
More informationCourse Syllabus. Planning and Administering Windows Server 2008 Servers. Key Data. Audience. At Course Completion. Prerequisites. Recommended Courses
Course Syllabus Planning and Administering Windows Server 2008 Servers This five-day instructor-led course provides students with the knowledge and skills to implement, monitor, and maintain Windows Server
More information10533: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Duration: Five Days
To register or for more information call our office (208) 898-9036 or email register@leapfoxlearning.com 10533: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Duration: Five Days
More informationModular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
More informationImplementing Microsoft Azure Infrastructure Solutions
20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is
More informationVERITAS Backup Exec 9.1 for Windows Servers. Intelligent Disaster Recovery Option
WHITE PAPER Intelligent Disaster Recovery VERITAS Backup Exec 9.1 for Windows Servers Intelligent Disaster Recovery Option 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Solution: Point-in-Time Disaster
More informationAudience. At Course Completion. Prerequisites. Course Outline. Take This Training
Designing a High Availability Messaging Solution using Microsoft Exchange Server 2007 Course 5054A: Two days; Instructor-Led Preliminary Course Syllabus Note: You are viewing a Preliminary Course Syllabus.
More informationMCSA Security + Certification Program
MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.
More informationContents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
More informationWindows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
More informationDependability in Web Services
Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.
More informationPlanning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
More informationMCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
More informationDNS Architecture Case Study: Resiliency and Disaster Recovery
DNS Architecture Case Study: Resiliency and Disaster Recovery Cricket Liu VP, Architecture Infoblox Company Background Large U.S.-based company, Company Co. (company.com) Three categories of sites Headquarters
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationMCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationCourse Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange
Course Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Learning Method: Instructor-led Classroom Learning Duration: 5.00
More informationNEC Corporation of America Intro to High Availability / Fault Tolerant Solutions
NEC Corporation of America Intro to High Availability / Fault Tolerant Solutions 1 NEC Corporation Technology solutions leader for 100+ years Established 1899, headquartered in Tokyo First Japanese joint
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationBefore taking this course, Citrix recommends that learners have the following:
Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications
More informationModule 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
More information"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
More informationA Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
More informationIT Service Management with System Center Service Manager
Course 10965B: IT Service Management with System Center Service Manager Page 1 of 9 IT Service Management with System Center Service Manager Course 10965B: 3 days; Instructor-Led Introduction This Three-day
More informationObjectif. Participant. Prérequis. Pédagogie. Oracle Database 11g - New Features for Administrators Release 2. 5 Jours [35 Heures]
Objectif Install Oracle Grid Infrastructure Install Oracle Database 11g Release 2 Use Oracle Restart to manage components Use Automatic Storage Management (ASM) enhancements Implement table compression
More informationLEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More information6445A - Implementing and Administering Small Business Server 2008
6445A - Implementing and Administering Small Business Server 2008 Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationDELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution
DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution Tested with: ESRP Storage Version 3.0 Tested Date: Content DELL TM PowerEdge TM T610... 1 500 Mailbox Resiliency
More informationManaging and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days
Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days Course Summary: This five-day instructor-led course provides students with the knowledge and skills to implement, monitor,
More informationCXA 204 1I Basic Administration for Citrix XenApp 6
COURSE DESCRIPTION CXA 204 1I Basic Administration for Citrix XenApp 6 Basic Administration for Citrix XenApp 6 training course provides the foundation necessary for administrators to effectively centralize
More informationChapter 7: Distributed Systems: Warehouse-Scale Computing. Fall 2011 Jussi Kangasharju
Chapter 7: Distributed Systems: Warehouse-Scale Computing Fall 2011 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note:
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationהמרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
More informationCourse 10534A: Planning and Designing a Microsoft Lync Server 2010 Solution
Course 10534A: Planning and Designing a Microsoft Lync Server 2010 Solution OVERVIEW About this Course This five-day instructor-led course teaches how to plan and design a Microsoft Lync Server 2010 solution
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 20465B; 5 days, Instructor-led Course Description This five-day, instructor-led course provides you with the
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationWhat s in Installing and Configuring Windows Server 2012 (70-410):
Brewster New York 10509 What s in Installing and Configuring Windows Server 2012 (70-410): The course provides skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an
More informationDatabase Resilience at ISPs. High-Availability. White Paper
Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but
More informationConfiguring Advanced Windows Server 2012 Services Course 20412
Configuring Advanced Windows Server 2012 Services Course 20412 Course Overview This version of this course 20412A utilizes pre-release software in the virtual machines for the labs. The five day course
More informationREMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM
On a Mission to Transform Talent REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM Table of Contents Module 1: Introduction to Hardware and Networking (Duration: 1.5 Weeks)...1 Module 2: Windows XP Professional
More informationBasic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led
Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Course Description Basic Administration for Citrix XenApp 6.5 training course provides the foundation necessary for administrators
More informationDesigning a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.
More informationCitrix XenApp 6.5 Administration
Presentation Style: Duration: Tutor-led Classroom 5 Days Course Start Time: 09:30hrs Course End Time: 16:30hrs Citrix XenApp 6.5 Basic Administration training course provides the foundation necessary for
More informationSCALABILITY AND AVAILABILITY
SCALABILITY AND AVAILABILITY Real Systems must be Scalable fast enough to handle the expected load and grow easily when the load grows Available available enough of the time Scalable Scale-up increase
More informationHUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be
More informationCore Solutions of Microsoft Lync Server 2013
Course 20336A: Core Solutions of Microsoft Lync Server 2013 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft Lync Server 2013 Type: Delivery Method: Course Instructor-led (classroom)
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More informationQUICK RECOVERY FOR RAID
Quick Recovery for RAID Features File Systems Supported Who suffers most Recovery Modes De-Stripper File Recovery Frequently Asked Questions QUICK RECOVERY FOR RAID Quick Recovery for RAID 0, RAID 5. Quick
More informationCA XOsoft High Availability for Windows
CA XOsoft High Availability for Windows Microsoft File Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is
More informationGlobule: a Platform for Self-Replicating Web Documents
Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide
More informationE foreseeable Disaster Recovery - Microsoft Exchange Server 2000/2003
White Paper Eight Best Practices in Implementing Disaster Recovery Protection for Microsoft Exchange Server 2000/2003 Abstract Protection of Microsoft Exchange messaging and collaboration services against
More informationFault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
More informationMS-10534 - Planning and Designing a Microsoft Lync Server 2010 Solution
MS-10534 - Planning and Designing a Microsoft Lync Server 2010 Solution Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationFundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
More informationCourse 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005
Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationOptimize Your Deployment Using Best Practices
Optimize Your Deployment Using Best Practices Presented by: Kayla Schilling Building Now for Your Future What is GP SQL Server Optimization? Independent review of your SQL configuration Verification that
More informationWindows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
More informationMicrosoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led
Microsoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led Course Description This three day course prepares IT Professionals to administer enterprise search solutions using
More informationMaintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Key Data Course #: 2275C Number of Days: 3 Format: Instructor-Led Certification Exams: None Certification Track: Exam 70-290: Managing and Maintaining
More informationImplementing a Microsoft Windows 2000 Network Infrastructure
Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing
More informationTushar Joshi Turtle Networks Ltd
MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering
More information10533A: Deploying, Configuring, and Administering Microsoft Lync Server 2010
10533A: Deploying, Configuring, and Administering Microsoft Lync Server 2010 Course Overview This instructor-led course teaches IT professionals how to deploy, configure, and administer a Microsoft Lync
More informationZanjan, Iran. University, Zanjan, Iran. *Corresponding Author's E-mail: leila.boti.aui@gmail.com
Presenting a Model to Reduce E-Banking Services Using Cloud Computing Leila Boti 1*, Seyyed Mohsen Hashemi 2, Mehdi Afzali 3 1 MSc student, Department of Computer Engineering, Zanjan Branch, Islamic Azad
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233 Course Outline Module 1: Introduction to Designing a Microsoft Exchange Server 2010 Deployment This
More informationCorporate I.T. Services Limited Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3)
Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3) Course 6415A: Three days; Instructor-Led Introduction This 3 day instructor-led course provides students with an understanding
More information